An Unexpected Implication of Lambda Privileges
July 4, 2023Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance.
Tenable Cyber Watch: Feds Offer $10 Million Reward for CL0P Info, Best Practices for Ransomware Incident Response, and more
July 3, 2023This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure to be at risk.
Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill
June 30, 2023Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!
The Default Toxic Combination of GCP Compute Engine Instances
June 29, 2023By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.
OT Maritime Security: Stormy Waters or Smooth Sailing Ahead?
June 29, 2023The maritime industry is navigating a sea of change when it comes to cybersecurity. The interconnected vessels and new technologies enabling the shipping world to become more efficient also introduce cyber risk. Here's what you need to know about the challenges and risks these floating cities face — and how Tenable can help.
How Exposure Management Can Make Pen Testing More Effective
June 28, 2023Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
A Practical Way To Reduce Risk on the Shop Floor
June 27, 2023There is a lot of noise on cybersecurity for the manufacturing shop floor, but where do you start? Let’s keep it simple and touch on why attackers do what they do, and what you can do to stop them. It’s all about reducing risk and maximizing your efforts to get the best results. Read on to learn more about the threat landscape and some tactics to manage the threats.
CVSSv4 is Coming: What Security Pros Need To Know
June 26, 2023The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products.
Tenable Cyber Watch: Verizon DBIR Warns About BEC and Ransomware, Cloud Security Tops CISOs’ Concerns, and more
June 26, 2023This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ country of origin.
CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC
June 23, 2023Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC
Cybersecurity Snapshot: As Feds Hunt CL0P Gang, Check Out Tips on Ransomware Response, Secure Cloud Management and Cloud App Data Privacy
June 23, 2023Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!
Shared Responsibility Model in the Cloud
June 21, 2023CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture.